Open Access Open Access  Restricted Access Subscription Access

Discrete Event Command and Control of Multiple Military Missions in Network Centric Warfare

Chee Khiang Pang, Cao Vinh Le, Oon Peen Gan, Greg Hudas, Matthew B. Middleton, Frank L. Lewis

Abstract


To meet both symmetrical and asymmetrical warfare requirements, new large-scale systems engineering solutions are required to transform the fighting capabilities of armed forces to Network Centric Warfare (NCW). In this paper, a formal Discrete Event Command and Control (DEC2) structure is presented which enables effective task planning, resource assignment, shared resource dispatching, and adaptability to dynamic missions. Two phases are included in the functionality of the DEC2 structure; namely, the planning phase and the operational phase. In the planning phase, the mission tasks and available resources are prescribed by the mission commander and field commanders, respectively, using the notion of Boolean matrices. In the operational phase, mission tasks and required resources based on active agents’ statuses are sequenced automatically. Our proposed DEC2 structure is simulated on a Singapore Armed Forces (SAF) team on two realistic ambush attack missions, and its effectiveness in sequencing the mission tasks and required resources online without conflicts and deadlocks is verified.

Full Text:

PDF

References


M. Jamshidi, Large-Scale Systems: Modeling, Control, and Fuzzy logic.

Upper Saddle River, NJ, USA: Prentice-Hall, Inc., Dec. 1996.

X. Wang, X. Wei, and H. Wang, “Network centric warfare analysis of U.S. army,” in Advances in Information Technology and Industry Applications, D. Zeng, Ed. Berlin, Germany: SpringerLink, vol. 136, pp. 573–578, 2012.

C. K. Pang, F. L. Lewis, T. H. Lee, and Z. Y. Dong, Intelligent Diagnosis and Prognosis of Industrial Networked Systems. Boca Raton, FL, USA: CRC Press, Taylor and Francis Group, 2011.

V. Giordano, P. Ballal, F. Lewis, B.Turchiano, and J. B. Zhang, “Supervisory control of mobile sensor networks: math formulation, simulation and implementation,” IEEE Transactions on Systems, Man, and

Cybernetics–Part B: Cybernetics, vol. 36, no. 4, pp. 806–819, Aug. 2006.

C. K. Pang, G. Hudas, M. B. Middleton, C. V. Le, O. P. Gan, and F. L. Lewis, “Discrete event command and control for networked teams with multiple military missions,” submitted to The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, 2012.

F. L. Lewis, A. Gurel, S. Bogdan, A. Doganalp, and O. Pastravanu, “Analysis of deadlock and circular waits using a matrix model for flexible

manufacturing systems,” Automatica, vol. 34, no. 9, pp. 1083–1100, Sep.

M. Mayo, M. J. Singer, and L. Kusumoto, “Massively multi-player (MMP) environments for asymmetric warfare,” The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, vol. 3, no. 3, pp. 155–166, 2006.

J. S. Albus, “4D/RCS a reference model architecture for intelligent unmanned ground vehicles,” in Proceedings of the SPIE 16th Annual International Symposium on Aerospace/Defense Sensing, Simulation and

Controls, Orlando, FL, USA, Apr. 1–5, 2002.

D. E. Pearson, The World Wide Military Command and Control System.

Montogomery, Alabama: Air University Press, 2000.

S. -C. Lim, “Network centric warfare: a command and control erspective,” Naval Postgraduate School Monterey, CA, USA, Technical Report ADA422430, Mar. 2004.

T. Huxley, Defending the Lion City: The Armed Forces of Singapore.

Sydney, NSW, Australia: Allen & Unwin Academic, 2000.

Ministry of Defence Singapore. [Online]. http://www.mindef.gov.sg/

imindef/mindef websites/atozlistings/army/ourforces.html [Accessed: 22

Jun. 2012].




DOI: http://dx.doi.org/10.21535%2FProICIUS.2012.v8.750

Refbacks

  • There are currently no refbacks.